1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
KengaRu [80]
3 years ago
8

If you had access to all resources, how would you deal with ethical questions?

Computers and Technology
2 answers:
Sphinxa [80]3 years ago
8 0
It would be A-in house counsel.
algol [13]3 years ago
6 0

Answer:

A) in-house counsel

Explanation:

An in-house counsel is basically a lawyer that works full time for your organization. He/she should be able to guide you about any ethical concern regarding the information or resources that you can access and what you should or should not do with them.

You might be interested in
PYTHON 3 CODE HS HELP PLZ
Tju [1.3M]

Answer:

B

Explanation:

It adds the same number over and over again, 'number' times.

This is number*number, a.k.a. number². (squared)

3 0
2 years ago
Write code which takes a user input of a String and an integer. The code should print each letter of the String the number of ti
Alexus [3.1K]

import java.util.Scanner;

public class JavaApplication70 {

   public static void main(String[] args) {

       Scanner scan = new Scanner(System.in);

       System.out.println("Input a String:");

       String txt = scan.nextLine();

       System.out.println("Input an integer:");

       int num = scan.nextInt();

       String newTxt = "";

       int w = 0;

       for (int i = txt.length()-1; i >= 0; i--){

           char c = txt.charAt(i);

           while (w < num){

               newTxt += c;

               w++;

           }

           w = 0;

       }

       System.out.println(newTxt);

   }

   

}

I hope this helps!

7 0
3 years ago
Read 2 more answers
Hashing algorithms are used on evidence files to uphold the chain of custody in an investigation. Which of the following is NOT
raketka [301]

Answer:

C. DAT-1

Explanation:

Chain of custody is applied when examining digital evidence and checking for proof that no alterations have been made to the document. It ensures that the original piece of digital evidence which could be in text, image, video, or other electronic formats, is preserved and protected from alterations. Hashing algorithms which are mathematical computations that help to condense files are applied during this procedure.

Common hashing algorithms applied, include;  the message digest 4, secure hashing algorithms 1, 2, 256, 224, 512, etc. The message digest 4 is used to evaluate why a particular piece of evidence was handled by an individual. This is further authenticated by examining the fingerprint.

4 0
3 years ago
If Mike saves $160 each month, how much will he save in 12 months? Enter your answer in the box.
denis-greek [22]

Answer:

$1,920

Explanation:

i think its that bc 160 x 12=1,920

im sorry if wrong but if right can i get brainlest?

7 0
2 years ago
What does the metric column in a routing table do?
Verdich [7]

Answer:

 The metric column basically indicate the cost of the route in the routing table and also decide correct route in the routing table.

In the routing table, the lowest metric route is more preferable route as compared to others. In the networking, the routing table is basically used to store the data or information in the form of table in the router.

In the computer network, the routes are listed for the particular destination in which the routes are basically associate that particular routes.

4 0
3 years ago
Other questions:
  • A ____ is a type of program that uses a grid to organize and work with data.
    14·1 answer
  • When viewing data entered into a spreadsheet, the columns identify _____.?
    5·1 answer
  • After reviewing the various types of network connections available, a client chooses a network connection that is considered to
    13·1 answer
  • Problem 3. Consider the following recurrence, defined for n a power of 4 (for the time of some algorithm): T(n) = 3 if n = 1 2T(
    5·1 answer
  • An Organization Chart to support the Appliance Warehouse case study The SWOT Analysis diagram you performed and created to suppo
    13·1 answer
  • What is the behavior of an element with static positioning in regard to the page layout?
    12·1 answer
  • How do I type over Images (photo posted ​
    12·2 answers
  • The add_prices function returns the total price of all of the groceries in the dictionary. Fill in the blanks to complete this f
    15·1 answer
  • Which of the following is NOT a type of insurance fraud?
    14·2 answers
  • What statement describes the last step in evaluating<br> information?
    10·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!